touch_id_iconThe United States Patent and Trademark Office today published an Apple patent application (via AppleInsider) describing methods for detecting the behavior of the person who is currently using the device and comparing them to past patterns. While the January 2013 patent application, "Generating Notifications Based on User Behavior", speaks relatively generically about such notifications, the invention's utility in providing device security seems clear.

This security method goes beyond the standard PIN-based security by examining cues such as grammar and vocabulary usage, motion sensor data, and gesture input to identify a user. Any changes from the recorded pattern of usage will send an alert that a new person is in control of the phone.

The phone then can either request that the person enter a password or Touch ID scan to confirm their identity or send a notification to a third-party service that alerts the original owner that their phone may be compromised.

A method for determining behavior associated with a user device, comprising: receiving behavior data identifying multiple types of user interaction with the user device; comparing the behavior data with patterns of behavior data associated with the user device, wherein the behavior-data patterns are generated from previously-received behavior data of an original user; determining a current user is potentially different from the original user based on the comparison of the behavior data with the patterns; and transmitting a command to the user device to lock the user device until the current user is verified as the original user.

Apple may be exploring this technology in response to increasing civil pressure to provide advanced security measures for its iOS devices. In the United States, a growing number of politicians, district attorneys and law enforcement officials on both the local and federal levels are asking mobile phone manufacturers to build a kill-switch feature that dissuades theft into their devices. While federal legislation makes it way through Congress, Minnesota earlier this year became the first state to require a kill switch in a mobile phone.

Tag: Patent

Top Rated Comments

macduke Avatar
146 months ago
Dad: I need to google something real quick and make a call. I left my phone in the car

Me: *hands phone to dad*

Siri: You type like an old man. Scan your thumb to verify your identity.

Me: *scans thumb and hands back phone*

Siri: You made an unusual search for "golf clubs". Scan your thumb to verify your identity.

Me: *scans thumb again*

Siri: You pinch to zoom like a noob and your posture has changed. Scan your thumb to verify your identity.

Me: Dad, just go get your iPhone.

…later that day, alone at home with my iPhone…

Siri: Your typing is much improved. Scan your thumb to verify your identity.

----------------------

Being chased by a murderer…

Me: *dialing 911*

Siri: You're trembling and typing erratically. Scan your thumb to verify your identity.

Me: *scans thumb*

Siri: Your thumb placement was unusual and your thumb very moist. Please scan your thumb again to verify your identity.

/dead lol
Score: 11 Votes (Like | Disagree)
RichTF Avatar
146 months ago
Hah, knew this comment would be here.

Gotta love the double standard
Not really a double standard, as the two companies have very different business models. Google makes its money off your personal profile. Apple makes its money off, well, your money.

Why is this so hard to understand? I trust Apple more with my personal details simply because they have no core business reason to abuse them. Google (and Facebook, etc.) do, and so I am more wary of what I give them. Perfectly rational.
Score: 4 Votes (Like | Disagree)
powerstrokin Avatar
146 months ago
Is there a "down vote" button hidden somewhere? I see a lot of posts here are in the negatives...
Score: 2 Votes (Like | Disagree)
kolax Avatar
146 months ago
How about Apple increases security by requiring more than just my passcode to view my saved password database? It's the same on OS X. I want to use a very long secure passphrase for it, but there's no way to do that with iCloud's keychain.

Could be a pain for families who share devices - unless we're going to see user profiles? Though I doubt it as I think Apple would much prefer everyone to buy their own device
Then your pattern would be what the family does. If someone outside your family started using it and it was widely different to the pattern your family does, it'll flag up.
Score: 2 Votes (Like | Disagree)
bpcookson Avatar
146 months ago
Sure, it sounds kinda creepy, but I'd rather Apple have this patent than Google.
Score: 2 Votes (Like | Disagree)
gnasher729 Avatar
146 months ago
Am I the first to think of the criminal side of things to this...I.e. Criminal mastermind is arrested, his/her cronies can remotely force a wipe/kill the device therefore completely destroying any evidence a law enforcement agency could glean from the device? Given that all iPhones supposedly encrypt everything? Probably wrong but it seems that side of things have been possibly completely overlooked?

The iPhone protects criminal masterminds from the police in exactly the same way it protect you from criminal masterminds. And there is no need for cronies to do a remote wipe. Use a strong passcode (not four digits, but ten digits or 8 random letters), set the iPhone to lock automatically after a very short time, and nobody can crack it.

For a search warrant, the police would actually need concrete evidence that evidence is stored on the phone. Saying "he's a criminal mastermind, there is surely same evidence on the phone" won't do, and the criminal mastermind's lawyer will (rightfully) tear anyone apart in court who tries something like that.

----------

Personally I don't care if a "mastermind" has his phone wiped. My data belongs to me. Besides a real wipe takes hours and hours, the iphone probably just marks the data for deletion and never overwrites it so its all still there.

Wrong. All data on any iPhone is encrypted. The encryption key is stored on the device (it is itself encrypted, obviously, and can only be encrypted by you entering the passcode). For safety in case it is accidentally destroyed, it's stored in two places. Erasing these two places is all it takes, and after that the data on the phone is not readable by anyone.
Score: 1 Votes (Like | Disagree)

Popular Stories

iOS 26 on iPhone Feature

Here's When iOS 26 Rolls Out Today in Every Time Zone [Update: Out Now!]

Monday September 15, 2025 12:00 am PDT by
Update 10:06 a.m.: iOS 26 is rolling out now, though it may take a bit for all users to see it, so keep checking! Today's the day! Apple is about to release iOS 26, which will deliver the biggest redesign since iOS 7 and bring a range of new features and improvements to iPhones worldwide. It's Apple's biggest software update of the year, and Apple announced at last week's iPhone event that...
Tim Cook Rainbow

Apple Reportedly Plans to Launch These 10 Products in 'Coming Months'

Sunday September 14, 2025 8:45 am PDT by
Apple's annual September event is now in the rearview mirror, with the iPhone 17, iPhone 17 Pro, iPhone 17 Pro Max, iPhone Air, Apple Watch Series 11, Apple Watch Ultra 3, Apple Watch SE 3, and AirPods Pro 3 set to launch this Friday, September 19. As always, there is more to come. In his Power On newsletter today, Bloomberg's Mark Gurman said Apple plans to release many products in the...
iOS 26 Battery Glass Feature

Apple Says Installing iOS 26 Might Impact Battery Life

Monday September 15, 2025 10:56 am PDT by
In the iOS 26 release notes, Apple is warning iPhone users that installing the new software might have a temporary impact on battery life, which is normal. A new support document explains that major iOS updates require background setup like indexing data and files for search, downloading new assets, and updating apps. Further, Apple says that new features could require more resources,...
AirPods Pro Firmware Feature

AirPods Pro 2 and AirPods 4 Get iOS 26 Features With New Firmware Update

Monday September 15, 2025 10:50 am PDT by
Apple today released updated firmware for the AirPods Pro 2 and the AirPods 4, introducing support for the new AirPods features that are included in iOS 26, iPadOS 26, and macOS Tahoe. The firmware has a build number of 8A356, and it replaces the current 7E93 firmware. With Apple's new software updates, the AirPods Pro 2 and the AirPods 4 support better audio quality for phone calls and...
iphone 17 lineup

iPhone 17 Models Launch on September 19 With These New Features

Friday September 12, 2025 7:58 am PDT by
Apple will launch its new iPhone 17 lineup and ultra-thin iPhone Air in stores on Friday, September 19, and the company has already shown off the new devices at its fall event, which ran with the the tagline "Awe dropping." The iPhone 17 series brings a host of new features and enhancements. Here's a rundown of the biggest upgrades and changes: iPhone 17 Display Changes The iPhone...
apple n1 chip

Apple's New N1 Chip in iPhone 17, iPhone 17 Pro, and iPhone Air Has a Wi-Fi 7 Limitation

Saturday September 13, 2025 10:01 am PDT by
The latest iPhone 17, iPhone 17 Pro, iPhone 17 Pro Max, and iPhone Air models are equipped with Apple's all-new N1 chip for Wi-Fi 7, Bluetooth 6, and Thread connectivity. However, the chip has a Wi-Fi 7 bandwidth limitation. According to FCC documents reviewed by MacRumors, the N1 chip in all of the new iPhone models supports up to 160 MHz channel bandwidth for Wi-Fi 7, short of the...
iPhone 17 Pro Air Boxes

iPhone Air and iPhone 17 Pro Boxes Revealed

Sunday September 14, 2025 1:36 pm PDT by
T-Mobile President Jon Freier today shared real-world photos of Apple's boxes for the iPhone Air, iPhone 17 Pro, and iPhone 17 models, which launch on Friday. Image Credit: Jon Freier Apple has typically included iPhone box renders in its product environmental reports, but it did not do so for the latest models. However, Apple's iPhone Upgrade Program page does offer some images of the boxes, ...